Dell Allies with AWS to Protect Data

Dell Technologies and Amazon Web Services (AWS) announced today at the AWS re:Invent conference that Dell EMC PowerProtect Cyber Recovery for AWS is available to enable organizations to create a pristine copy of their data that can be accessed in the event of a cyberattack.

Previously available on hypervisors from VMware, Dell is now making an instance of the data protection platform available on AWS’ Amazon Machine Image (AMI) virtual machine appliance.

Rob Emsley, director of product marketing for data protection at Dell Technologies, said Dell EMC PowerProtect Cyber Recovery makes it possible to create an airgapped cyber vault that physically and logically isolates data on a private cloud that requires separate security credentials and multifactor authentication to access.

The goal is to increase the cyberresiliency of organizations by making it easier for them to recover a copy of their data after it was encrypted during a ransomware attack, said Emsley.

Available via the AWS Marketplace, Dell also plans to make Dell EMC PowerProtect Cyber Recovery available on a wider range of cloud platforms, he added.

As more organizations put in place ransomware recovery plans, many are starting to converge the management of cybersecurity and data protection. This method ensures they can access a pristine copy of their data in the event their primary data becomes encrypted in the wake of a ransomware attack.

The challenge is that a 2021 Dell Technologies Global Data Protection Index survey of 1,000 global IT decision-makers found that more than two-thirds of respondents (67%) admitted they lack confidence that all business-critical data can be recovered in the event of such a cyberattack. The goal now is to make sure that data is regularly backed up in a way that prevents malware from encrypting copies of that data in addition to the data residing in the primary IT environment. As part of an effort to achieve that goal, more organizations are finally converging their cybersecurity and data protection processes.

It may never be possible to completely secure IT environments against a ransomware attack. However, it is possible to limit the scope of the damage by ensuring the organization always has access to its most critical data. That capability essentially turns a ransomware attack into an inconvenience rather than an existential threat to the business.

Ransomware, of course, is a major cybersecurity scourge. Organizations of all sizes have fallen victim to attacks that required them to make exorbitant ransom payments. There may come a day, however, when making a ransomware payment is no longer a legal option. In fact, the U.S. Department of the Treasury has already signaled it will investigate such payments. As such, the best course of action for all organizations is to make sure they have a copy of their data always available because the cost of making a ransomware payment may soon simply be too great to even consider.

Avatar photo

Michael Vizard

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

mike-vizard has 736 posts and counting.See all posts by mike-vizard